Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
bc98a9925d233cb28ec2440154a870c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bc98a9925d233cb28ec2440154a870c7.exe
Resource
win10v2004-20231215-en
General
-
Target
bc98a9925d233cb28ec2440154a870c7.exe
-
Size
188KB
-
MD5
bc98a9925d233cb28ec2440154a870c7
-
SHA1
826db3b47878be826395adaafb1a7509505d8dcd
-
SHA256
23bec9f9015634b7e18b6bdf7831e0776ca5312568860bba29ed83e1fe9088e3
-
SHA512
1d64be7bc27e5b45249f28c44293c9bfcf152359e86409ae726e234c17e4fbbed7867d35a8a25d576baa52ac6324baf1bdfd19f6c31921cc71c4ada5b9639284
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8Lk:o68i3odBiTl2+TCU/yk
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" bc98a9925d233cb28ec2440154a870c7.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exe bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon3.ico bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon12.ico bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\bugMAKER.bat bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon2.ico bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon5.ico bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon10.ico bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\winhash_up.exez bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon7.ico bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon13.ico bc98a9925d233cb28ec2440154a870c7.exe File opened for modification C:\Windows\winhash_up.exez bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon6.ico bc98a9925d233cb28ec2440154a870c7.exe File created C:\Windows\SHARE_TEMP\Icon14.ico bc98a9925d233cb28ec2440154a870c7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2884 1268 bc98a9925d233cb28ec2440154a870c7.exe 28 PID 1268 wrote to memory of 2884 1268 bc98a9925d233cb28ec2440154a870c7.exe 28 PID 1268 wrote to memory of 2884 1268 bc98a9925d233cb28ec2440154a870c7.exe 28 PID 1268 wrote to memory of 2884 1268 bc98a9925d233cb28ec2440154a870c7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc98a9925d233cb28ec2440154a870c7.exe"C:\Users\Admin\AppData\Local\Temp\bc98a9925d233cb28ec2440154a870c7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5c2ae557ffb21c25313353e5b353ef87f
SHA193650324b548ee6d00b42c3b34f245344d534f14
SHA2568dd031b746b43260d8bbd6cc0950df8b73e6d7b5bdd8c0e0664713c8578e21ee
SHA512440c4a7a8a1c0d03b6e0ef3e98fe98b84e07606058809b4129ed08453f372337058e4c7956e259057cdaad9a8e910a9e73eb7e631779f3f4443d75ae4f6fcf83